CxO, Security, Low Code, Technology, Operations, FOSS, DevOps, Virtualization, Encryption, Developer, Oracle, Dell, Citrix, CxO Events (318.1.Monday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
CxO
Security
Low Code
Technology
Operations
FOSS
DevOps
Virtualization
Encryption
Developer
Oracle News
Dell News
Citrix News
CxO Events
Join us as we explore both the leadership and technology landscapes, and provide useful operational guidance for seizing the opportunities for integrating machine learning, maturing our cloud capabilities, data management, and C-suite participation. Register
CxO
CIOs Must Address It's Perceived Value Problem
With 2025 budget battles upon us, IT leaders must recognize the importance of perception and fix how IT value is measured to ease their arguments for adequate advantage-producing investment....more
Forrester's CISO Budget Priorities For 2025 Focus On API, Supply Chain Security
Going into 2025, safeguarding revenue and minimizing business risks must dominate CISOs' budgets, with investments aligned with business operations driving priorities....more
AI Skills: Why Even C-Suite Executives Need Them Now
Discover the essential AI skills every C-suite executive needs to lead in today's digital landscape....more
How Leading CIOs Cultivate Business-Centric IT
CIOs have done the work to become critical business leaders. Now they're upleveling IT's business intelligence with new strategies for hiring, collaboration, and training....more
Security
Protecting National Interests: Balancing Cybersecurity And Operational Realities
With cyber threats becoming increasingly sophisticated and targeting critical infrastructure, in this Help Net Security interview, David Ferbrache, managing director of Beyond Blue, discusses the current state of cybersecurity readiness and resilience....more
Ever-Increasing Data Breach Costs: Why And What To Do
Data breach costs keep rising-it's a perennial occurrence at this point to see these types of statements. But it doesn't necessarily need to be the default for this trend to continue. In fact, you could argue that frequent reports, warnings and advisories should help drive costs down. So, what's going on with ever-increasing data breach costs? And what can you do about it?...more
Navigating Compliance: Password And Credential Security
In today's digital age, the threat of cyberattacks is growing at an alarming rate. The frequency and impact of these attacks are escalating, prompting governments and industry bodies to introduce a slew of regulations designed to protect sensitive data....more
Top 10 Benefits Of Outsourcing Your Data Protection Officer
Today, protecting sensitive data has become more critical than ever. Businesses need to follow data protection laws to avoid penalties and reduce the risk of data breaches, especially concerning the processing of personal data. One way to achieve this is through Data Protection Officer outsourcing (DPO outsourcing)....more
Find out which technologies are considered fast movers, fast followers, majority followers or laggards in their respective markets. You will walk away from this session with answers to your vital questions, a copy of the research slides and recommended actions to help you achieve your goals. Register
Low Code
AI-Enhanced Low-Code: Bridging The Gap Between Business Users And IT
The idea of useful applications created without writing a line of code certainly isn't a new idea to take flight, but it is reaching cruising altitude. The makers of low-code platforms hope AI-powered natural language chatbots will get low-code development to its full potential....more
Managing Low-Code/No-Code Security Risks
Continuous threat exposure management (CTEM) - a concept introduced by Gartner - monitors cybersecurity threats continuously rather than intermittently....more
Technology
10 Important Emerging Technologies For 2025 And Beyond
Forrester's Brian Hopkins highlights AI chips and sustainability management technology as key trends to watch....more
Bluetooth 6.0 Will Bring 'Centimeter-Level Accuracy' To Find My Tech
A new technology called Bluetooth Channel Sounding will bring true distance awareness to Find My tags and other devices. Here's what that means. adrian-kingsley-hughes...more
Bluetooth 6.0 Will Speed Up Device Connections
The Bluetooth Special Interest Group (SIG) has released Bluetooth Core Specification version 6.0. This new version introduces a range of features and improvements to functionality and security of Bluetooth devices....more
Operations
How Server Health Monitoring Supports Proactive Maintenance
The rise of online businesses has increased the demand for fast and reliable websites. To remain competitive, organizations need a strong IT infrastructure....more
Cloud Security Assurance: Is Automation Changing The Game?
We explore the opportunities and limitations of automated security assurance by taking a close look at GCP and Azure cloud reports for ISO 27001....more
领英推荐
Join us for a dynamic roundtable discussion featuring a panel of experienced professionals in modern banking and cloud technologies from Hexaware and Amazon Web Services. Register
FOSS
Samba 4.21 Launches With Enhanced Security Features
Samba 4.21, a free software re-implementation of the SMB protocol, rolls out with enhancements in LDAP TLS, user validation, and more....more
Top End-To-End Open-Source MLOps Tools For 2024
MLOps (Machine Learning Operations) is receiving huge traction lately as more and more organizations are utilizing AI-driven systems....more
DevOps
Top DevSecOps Frameworks for Secure Development
DevSecOps has emerged as a vital approach. In this article know what is DevSecOps and why is it important....more
Unlock Business Value Through Effective DevOps Infrastructure Management
Effective DevOps infrastructure management is key to accelerating development cycles, enhancing collaboration, and maintaining security while aligning with organizational goals and customer needs....more
Don't Get Caught In The DevOps Loop
The DevOps movement has changed how software is built and released by injecting automation and best practices into the veins of the software development lifecycle (SDLC) in a way that has substantially reduced the time and effort required to build and deploy software....more
The device management landscape is changing dramatically - especially for business-critical dedicated devices like point of sale systems, kiosks, and the like. If you're looking for the springboard to help you take your device fleet to the next level by getting ahead of the curve, this webinar is for you. Register
Virtualization
VMware Alternative Data Protection Checklist
Ensuring robust data protection and application resiliency is critical as organizations evaluate VMware alternatives....more
Encryption
5 Steps For Implementing The New Post-Quantum Cryptography Standards
Develop new strategies to mitigate quantum risks, map vulnerabilities, prioritize high-value assets, prototype PQC impacts, and enhance cryptographic agility....more
Understanding Quantum Threats And How To Secure Data With Post-Quantum Cryptography
Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers....more
Quantum Encryption: The Next Big Thing In Data Security?
As the digital landscape evolves, so do the threats to data security. Traditional encryption methods, while robust, are increasingly vulnerable to the advancements in computing power, particularly with the advent of quantum computing....more
Developer
Top 10 Tools For Developing AI-Powered Mobile Apps
AI-powered mobile apps can analyze user behavior, make predictions, automate tasks, and provide personalized experiences, making them increasingly popular in various industries....more
Google Says Replacing C/C++ In Firmware With Rust Is Easy
Google recently rewrote the firmware for protected virtual machines in its Android Virtualization Framework using the Rust programming language and wants you to do the same, assuming you deal with firmware....more
Top AI Kits For Learning Programming In 2024
AI is becoming an integral part of today's technology; hence, learning to program in AI is critical for the attainment of success in the tech world....more
Join James Eastham from Datadog and Rahul Popat from AWS as they teach you about serverless, giving you a deeper understanding of what you need to consider as a developer to ensure your system is observable and that when you release software, you know exactly how it behaves in production. Register
Oracle News
Oracle Launches Secure Cloud Computing Architecture (SCCA) for Brokers and Integrators Serving the U.S. Department of Defense
New Oracle solution simplifies meeting SCCA requirements to reduce cost and accelerate cloud migration...more
Dell News
Preparing Your Data Center For A Genai World
Stepping in the world of generative AI (GenAI) is like entering a new realm, filled with unique challenges and opportunities. Just as Dorothy needed guidance to navigate Oz, organizations must prepare their data centers to handle the demands of AI infrastructure....more
Uncovering Success With Dell Premier: Empowering Customers With Self-Service Capabilities
Enabling customers to take their procurement into their own hands and unlock their full potential of their modern workplace....more
Unleashing The Future: Dell's Journey In Liquid Cooling Innovation
Dell leads the way in Direct Liquid Cooling, revolutionizing AI performance and setting new benchmarks in data center efficiency....more
Citrix News
Maximize Citrix Performance And Security With The Power Of uberAgent 7.3
We're excited to announce the release of uberAgent 7.3! This version is packed with improvements based on what customers like you have been asking for-better integration with Citrix components, along with enhanced security visibility....more
In this webinar, we'll delve deeper into the complexities of managing Security Champions, addressing common hurdles, and maximizing their impact on your application security posture. Register
CxO Events
Gartner: The Most Impactful Emerging Technologies for 2025 (Sept. 16th)
Find out which technologies are considered fast movers, fast followers, majority followers or laggards in their respective markets. You will walk away from this session with answers to your vital questions, a copy of the research slides and recommended actions to help you achieve your goals....more
TDWI: Data Monitoring, Management, and Observability - Results of New TDWI Best Practices Research (Sept. 16th)
Join TDWI's VP of Research, Fern Halper, as she explores the results of TDWI's latest research and moderates a panel of experts discussing data monitoring, management, and observability....more
IDC: Technical Debt: It's Not a Curse Word, but a Strategic Asset (Sept. 18th)
In this webcast, James Tarala, Senior Faculty at the SANS Institute and Managing Partner at Cyverity, will explain the state of cybersecurity standards in 2024 with a scorecard comparison of popular standards based on specific, measurable research....more
NETWORKComputing: How to Make Network Management Easier in 2024-25 (Sept. 19th)
In this event, learn what tools, technologies, techniques, and skills can help your team bear the weight of these demands....more
Join us for an insightful 60-minute webinar exploring the critical role of a Cloud Center of Excellence (CCoE) in steering organizational success through effective cloud adoption. Register
This presentation will illustrate how systems requirements are seamlessly consumed and refined by downstream disciplines and how we can leverage Dassault Systemes platform to build a complete system virtual twin that can be used with several level of abstractions to validate requirements, verify & optimize design.